5 Myths about Ransomware Debunked

Posted by Ben Spector on 21-Aug-2017 15:12:18

In May 2017, the WannaCry ransomware infected more than 230,000 computers in over 150 countries, making it the largest cyberextortion scheme to date, according to CNET. WannaCry has one redeeming value, though. It is serving as a wake-up call to business leaders who have not been taking this type of threat seriously. Their lack of concern is often due to common misconceptions about ransomware.Here are five myths debunked:

Read More

Topics: IT, News, ransomware, cyber, cyberattack, cybercrime, Cyber Security

How Ready Are You For GDPR?

Posted by Ben Spector on 15-Aug-2017 16:13:33

Does your company have a Cyber Security Policy?

A Company Cyber Security Policy sets out to preserve the security of your data and technology infrastructure. All businesses should have a security policy in place that is regularly assessed, updated as necessary and shared across the entire business, ensuring that all staff comply with that policy.

Read More

Topics: cyber crime, IT, News, policy, cyber, cyber threat, GDPR, Passwords, protocols, training, Cyber Security

How to Reduce Your Costs If Your Data Is Breached

Posted by Ben Spector on 21-Jul-2017 11:49:00

Being prepared for a data breach can save your business a great deal of money if one occurs. Discover what the top three preparations are and the extent to which they can reduce data breach costs.

Data breaches are occurring at record pace in 2017 in the United States and other parts of the world. Taking preventive measures, such as locking down your network, using security software, and creating strong passwords, can make it much harder for cybercriminals to infiltrate your business. However, despite your best efforts to prevent a data breach, your company might still experience one. This is partly due to the fact that data breaches are not always the result of cyberattacks. They are also caused by human error, system glitches, and malicious insiders.

Read More

Topics: Data Breach, Disaster Recovery, firewall, solutions, Business operations, Data Backup, helpdesk, IT, IT Support, theft, business, cyberattack, fraud, Small Business, Windows, budgeting, costs, File Sharing, Cyber Security

What Is Downtime Really Costing Your Business?

Posted by Ben Spector on 11-Jul-2017 11:53:00

Knowing the costs associated with downtime can help you prioritize IT spending within your technology budget. Learn how to calculate both the direct and indirect costs resulting from downtime.

Read More

Topics: Wireless Communications, Cloud Computing, Data Breach, Disaster Recovery, Email Solutions, network, servers, telecommunications, Business operations, Data, Data Backup, helpdesk, IT, IT Support, business, Communications, computer, computers, productivity, remote working, Small Business, technology, wireless, budgeting, costs, Cyber Security

How to Make Apps More Accessible in Windows 10

Posted by Ben Spector on 08-Jun-2017 13:07:57

Windows 10 lists the six apps you use most often at the top of Start menu. To open a program that you use less often, you have to scroll down the Start menu's long list of apps or start typing the program's name in the search box.

Read More

Topics: IT, News, apps, computer, Windows

Don't Let Your Business Become the Next Spear Phishing Victim

Posted by Ben Spector on 25-May-2017 12:53:40

Spear phishing scams targeted at businesses have proven to be very lucrative for cybercriminals. For example, since January 2015, hackers have stolen over $3 billion (USD) from more than 22,000 companies worldwide using a type of spear phishing attack known as a Business Email Compromise (BEC) scam, according to the U.S. Federal Bureau of Investigation (FBI). BEC scams specifically target companies that regularly send wire transfer payments or work with foreign suppliers.

Read More

Topics: firewall, IT, News, phishing, theft, anti virus, computers, cyber, email, fraud, Cyber Security

Join Our Mailing List

Recent posts

Posts by tag

See all